Watching the slow motion Twitter trainwreck is just amazing. I hope we get an amazing postmortem out of this, but chances are their security team is just incompetent/understaffed and this just boils down to someone's credentials being stolen and them failing at containment.
-
-
The only abuse you could inflict with the killswitch is delaying account admin actions, which is an entirely reasonable response to abuse and a feature you must absolutely implement if you have user access tools like this.
-
It's common sense that any time you're mutating user data or viewing private user data, you audit the hell out of everything so you can immediately respond to abuse and revert it, and lock out the attackers. They should've had alerts for this kind of thing too.
End of conversation
New conversation -
-
-
broken management or not, how do you balance the ability to cripple production systems with these features behaving as a killswitch for legit emergencies? (I’ve seen plenty of broken management, and that may bias how I’d perceive this)
-
Again, it's a killswitch *for an admin tool*. There is zero user impact to using it, and no excuse for it to not exist. At most some support tickets might take longer to resolve. No reason not to have a ton of safety nets around internal tools that can take over accounts.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.